Movatterモバイル変換


[0]ホーム

URL:


US20140298423A1 - Facilitating separation-of-duties when provisioning access rights in a computing system - Google Patents

Facilitating separation-of-duties when provisioning access rights in a computing system
Download PDF

Info

Publication number
US20140298423A1
US20140298423A1US14/267,584US201414267584AUS2014298423A1US 20140298423 A1US20140298423 A1US 20140298423A1US 201414267584 AUS201414267584 AUS 201414267584AUS 2014298423 A1US2014298423 A1US 2014298423A1
Authority
US
United States
Prior art keywords
review
access
risk management
user
violation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/267,584
Other versions
US9537892B2 (en
Inventor
Armen Moloian
Ronald W. Ritchey
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of America Corp
Original Assignee
Bank of America Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/801,314external-prioritypatent/US9639594B2/en
Application filed by Bank of America CorpfiledCriticalBank of America Corp
Priority to US14/267,584priorityCriticalpatent/US9537892B2/en
Assigned to BANK OF AMERICA CORPORATIONreassignmentBANK OF AMERICA CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RITCHEY, RONALD W., MOLOIAN, ARMEN
Publication of US20140298423A1publicationCriticalpatent/US20140298423A1/en
Priority to US15/095,588prioritypatent/US10341385B2/en
Application grantedgrantedCritical
Publication of US9537892B2publicationCriticalpatent/US9537892B2/en
Activelegal-statusCriticalCurrent
Adjusted expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

Systems and methods for managing risk management rules are provided. A risk management rule may be configured at a rule configuration interface are described. The rule configuration interface may include a list of access rights available for selection. Based on input received, one of the access rights may be identified as a base access right and one of the access rights may be identified as a conflicting access right for the risk management rule. The access rights provisioned at the computing system may be monitored to determine whether a user is provisioned with both the base access right and the conflicting access right. If so, a violation review may be created and presented at a violation review interface at which a decision for the violation review is receivable. An exception to the risk management rule may also be configured at an exception configuration interface.

Description

Claims (20)

What is claimed is:
1. A system for managing risk management rules comprising:
at least one processor;
a rule configuration interface at which a risk management rule is configurable in response to input received at the rule configuration interface wherein the rule configuration interface comprises a list of access rights available for selection; and
memory storing instructions that, when executed by the at least one processor, cause the system to
identify a first access right as a base access right for the risk management rule based on the input received at the rule configuration interface,
identify a second access right as a conflicting access right for the risk management rule based on the input received at the rule configuration interface, and
monitor access rights provisioned at a computing system to determine whether a user is provisioned with both the base access right and the conflicting access right.
2. The system ofclaim 1 wherein:
the instructions, when executed by the at least one processor, further cause the system to
create a violation review associated with the risk management rule responsive to determining that the user has been provisioned with both the base access right and the conflicting access right.
3. The system ofclaim 2 further comprising:
an exception configuration interface at which an exception to the risk management rule is configurable in response to input received at the exception configuration interface.
4. The system ofclaim 3 wherein:
the exception configuration interface comprises a list of attribute values available for selection; and
wherein the instructions, when executed by the at least one processor, further cause the system to associate one of the attribute values with the exception based on the input received.
5. The system ofclaim 4 wherein:
the instructions, when executed by the at least one processor, further cause the system to set an expiration date for the exception in response to the input received at the exception configuration interface.
6. The system ofclaim 3 further comprising:
a violation review interface at which a review decision for the violation review is receivable;
wherein the violation review interface comprises a pending violation review list that identifies the violation review and the risk management rule associated with the violation review; and
wherein the instructions, when executed at the at least one processor, further cause the system to store, at a data store, the review decision received at the violation review interface.
7. The system ofclaim 6 wherein:
the pending violation review list further identifies an exception associated with the risk management rule and whether the exception applies to the risk management rule.
8. The system ofclaim 6 wherein:
the instructions, when executed by the at least one processing unit, further cause the system to,
responsive to determining that the review decision indicates approval of violation of the risk management rule,
prompt for a justification of the approval of the violation of the risk management rule, and
store the justification at the data store with the review decision.
9. The system ofclaim 3 wherein:
the instructions, when executed, further cause the system to
determine whether the exception applies to the risk management rule based on a comparison of an attribute value associated with the exception to a corresponding attribute value of a user associated with the violation review.
10. The system ofclaim 9 wherein:
the instructions, when executed, cause the system to determine whether the exception applies to the risk management rule further based on a comparison of an expiration date set for the exception to a current date.
11. A computer-implemented method for managing risk management rules comprising:
providing a rule configuration interface at which a risk management rule is configurable in response to input received at the rule configuration interface wherein the rule configuration interface comprises a list of access rights available for selection;
identifying a first access right as a base access right for the risk management rule based on the input received at the rule configuration interface;
identifying a second access right as a conflicting access right for the risk management rule based on the input received at the rule configuration interface; and
monitoring access rights provisioned at a computing system to determine whether a user is provisioned with both the base access right and the conflicting access right.
12. The computer-implemented method ofclaim 11 further comprising:
creating a violation review associated with the risk management rule responsive to determining that the user has been provisioned with both the base access right and the conflicting access right.
13. The computer-implemented method ofclaim 12 further comprising:
providing an exception configuration interface at which an exception to the risk management rule is configurable in response to input received at the exception configuration interface wherein the exception configuration interface comprises a list of attribute values available for selection; and
associating one of the attribute values with the exception based on the input received at the exception configuration interface; and
setting an expiration date for the exception based on the input received at the exception configuration interface.
14. The computer-implemented method ofclaim 13 further comprising:
determining whether the exception applies to the risk management rule based on
i) a comparison of the attribute value associated with the exception to a corresponding attribute value of a user associated with the violation review, and
ii) a comparison of the expiration date set for the exception to a current date.
15. The computer-implemented method ofclaim 12 further comprising:
providing a violation review interface at which a review decision for the violation review is receivable wherein the violation review interface comprises a pending violation review list that identifies the violation review and the risk management rule associated with the violation review; and
storing the review decision received at the violation review interface at a data store.
16. The computer-implemented method ofclaim 15 wherein:
the pending violation review list further identifies an exception associated with the risk management rule and whether the exception applies to the risk management rule.
17. The computer-implemented method ofclaim 15 wherein the review decision indicates approval of violation of the risk management rule is approved and further comprising:
responsive to determining that the review decision indicates approval of violation of the risk management rule,
prompting for a justification of the approval of the violation of the risk management rule, and
storing the justification at the data store with the review decision.
18. Non-transitory computer-readable media having instructions, that when executed by a processor of a computing device, cause the computing device to:
selectively provide a plurality of interfaces at a display device in response to input received at the computing device wherein the plurality of interfaces include
i) a rule configuration interface at which a risk management rule is configurable in response to input received at the rule configuration interface wherein the rule configuration interface comprises a list of access rights available for selection,
ii) an exception configuration interface at which an exception to the risk management rule is configurable in response to input received at the exception configuration interface wherein the exception configuration interface comprises a list of attribute values available for selection, and
iii) a violation review interface at which a review decision for a violation review associated with the risk management rule is receivable wherein the violation review interface comprises a pending violation review list that identifies the violation review, the risk management rule associated with the violation review, and the exception to the risk management rule;
identify a first access right as a base access right and a second access right as a conflicting access right for the risk management rule based on the input received at the rule configuration interface;
associate one of the attribute values with the exception based on the input received at the exception configuration interface;
create the violation review responsive to determining that the user has been provisioned with both the base access right and the conflicting access right; and
store, at a data store, the review decision received at the violation review interface.
19. The non-transitory computer-readable media ofclaim 18 wherein:
the rule configuration interface further comprises a plurality of violation severity levels available for selection;
the instructions, when executed by the processor of the computing device, further cause the computing device to
identify one of the violation severity levels as a selected violation severity level for the risk management rule based on the input received at the rule configuration interface; and
the pending violation review list further identifies the selected violation severity level of the risk management rule.
20. The non-transitory computer-readable media ofclaim 19 wherein the instructions, when executed by the processor, further cause the computing device to:
set a due date for the violation review based on the selected violation severity level of the risk management rule.
US14/267,5842012-12-202014-05-01Facilitating separation-of-duties when provisioning access rights in a computing systemActive2033-08-03US9537892B2 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US14/267,584US9537892B2 (en)2012-12-202014-05-01Facilitating separation-of-duties when provisioning access rights in a computing system
US15/095,588US10341385B2 (en)2012-12-202016-04-11Facilitating separation-of-duties when provisioning access rights in a computing system

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201261740205P2012-12-202012-12-20
US13/801,314US9639594B2 (en)2012-12-202013-03-13Common data model for identity access management data
US14/267,584US9537892B2 (en)2012-12-202014-05-01Facilitating separation-of-duties when provisioning access rights in a computing system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/801,314Continuation-In-PartUS9639594B2 (en)2012-12-202013-03-13Common data model for identity access management data

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US15/095,588ContinuationUS10341385B2 (en)2012-12-202016-04-11Facilitating separation-of-duties when provisioning access rights in a computing system

Publications (2)

Publication NumberPublication Date
US20140298423A1true US20140298423A1 (en)2014-10-02
US9537892B2 US9537892B2 (en)2017-01-03

Family

ID=51622207

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/267,584Active2033-08-03US9537892B2 (en)2012-12-202014-05-01Facilitating separation-of-duties when provisioning access rights in a computing system
US15/095,588Active2033-10-13US10341385B2 (en)2012-12-202016-04-11Facilitating separation-of-duties when provisioning access rights in a computing system

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US15/095,588Active2033-10-13US10341385B2 (en)2012-12-202016-04-11Facilitating separation-of-duties when provisioning access rights in a computing system

Country Status (1)

CountryLink
US (2)US9537892B2 (en)

Cited By (24)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140289796A1 (en)*2012-12-202014-09-25Bank Of America CorporationReconciliation of access rights in a computing system
US20160147886A1 (en)*2014-11-202016-05-26Facebook, Inc.Querying Groups of Users Based on User Attributes for Social Analytics
US20160234252A1 (en)*2015-02-062016-08-11Honeywell International Inc.Apparatus and method for dynamic customization of cyber-security risk item rules
US9483488B2 (en)2012-12-202016-11-01Bank Of America CorporationVerifying separation-of-duties at IAM system implementing IAM data model
US9489390B2 (en)2012-12-202016-11-08Bank Of America CorporationReconciling access rights at IAM system implementing IAM data model
US9495380B2 (en)2012-12-202016-11-15Bank Of America CorporationAccess reviews at IAM system implementing IAM data model
US20160373402A1 (en)*2015-06-222016-12-22Bank Of America CorporationInformation Management and Notification System
US9529989B2 (en)2012-12-202016-12-27Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9529629B2 (en)2012-12-202016-12-27Bank Of America CorporationComputing resource inventory system
US9537892B2 (en)*2012-12-202017-01-03Bank Of America CorporationFacilitating separation-of-duties when provisioning access rights in a computing system
US9542433B2 (en)2012-12-202017-01-10Bank Of America CorporationQuality assurance checks of access rights in a computing system
US9639594B2 (en)2012-12-202017-05-02Bank Of America CorporationCommon data model for identity access management data
WO2020131927A1 (en)*2018-12-182020-06-25Jpmorgan Chase Bank, N.A.Account lifecycle management
CN114143106A (en)*2021-12-072022-03-04北京天融信网络安全技术有限公司Approval method and device, electronic equipment and storage medium
US20220182389A1 (en)*2020-12-072022-06-09Hangzhou Jindoutengyun Technologies Co., Ltd.Network resource access system and method, user portal and resource portal
US11416771B2 (en)2019-11-112022-08-16International Business Machines CorporationSelf-learning peer group analysis for optimizing identity and access management environments
US11777991B2 (en)2020-11-302023-10-03Amazon Technologies, Inc.Forecast-based permissions recommendations
US11783325B1 (en)2021-03-262023-10-10Amazon Technologies, Inc.Removal probability-based weighting for resource access
US11803621B1 (en)*2021-03-312023-10-31Amazon Technologies, Inc.Permissions searching by scenario
US11818174B1 (en)2020-11-252023-11-14Amazon Technologies, Inc.Contextual policy weighting for permissions searching
US11847241B1 (en)*2018-04-202023-12-19Amazon Technologies, Inc.Management of service permissions
US20240419818A1 (en)*2021-11-022024-12-19Nagravision SàrlAccess management system for managing access to resources
US12177263B1 (en)*2022-03-232024-12-24Amazon Technologies, Inc.Semi-automated role creation for governance of machine-learning systems
US12335318B1 (en)*2020-12-042025-06-17Amazon Technologies, Inc.Detecting conflicts between a generated access management policy and invoked access management policies

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9830568B2 (en)*2014-08-142017-11-28Bank Of America CorporationControlling and managing identity access risk
US10956243B2 (en)2018-06-042021-03-23Zuora, Inc.Systems and methods for providing uniform access in a multi-tenant system
US11169998B2 (en)2018-06-042021-11-09Zuora, Inc.Multi-tenant system for providing arbitrary query support
US11301617B2 (en)*2018-06-042022-04-12Zuora, Inc.Systems and methods for providing error recovery in data transmissions
CN110166473B (en)*2019-05-292021-08-27中国移动通信集团江苏有限公司Network data transmission detection method, device, equipment and medium
US11409586B2 (en)2019-06-032022-08-09Zuora, Inc.Systems and methods for extending the data model of a monolithic database through a microservice for a multi-tenant platform
US11615066B2 (en)2019-06-032023-03-28Zuora, Inc.Systems and methods for providing custom objects for a multi-tenant platform with microservices architecture

Citations (48)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP0707264A2 (en)*1994-10-131996-04-17Sun Microsystems, Inc.System and method for determining whether a software package conforms to packaging rules and requirements
US5574927A (en)*1994-03-251996-11-12International Meta Systems, Inc.RISC architecture computer configured for emulation of the instruction set of a target computer
US5889953A (en)*1995-05-251999-03-30Cabletron Systems, Inc.Policy management and conflict resolution in computer networks
US5987611A (en)*1996-12-311999-11-16Zone Labs, Inc.System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6321334B1 (en)*1998-07-152001-11-20Microsoft CorporationAdministering permissions associated with a security zone in a computer system security model
US20020095322A1 (en)*2000-10-272002-07-18Manugistics, Inc.System and method of monitoring supply chain parameters
US6460141B1 (en)*1998-10-282002-10-01Rsa Security Inc.Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
US20020156816A1 (en)*2001-02-132002-10-24Mark KantrowitzMethod and apparatus for learning from user self-corrections, revisions and modifications
US20040034582A1 (en)*2001-01-172004-02-19Contentguard Holding, Inc.System and method for supplying and managing usage rights based on rules
US20040158455A1 (en)*2002-11-202004-08-12Radar Networks, Inc.Methods and systems for managing entities in a computing device using semantic objects
US20040267552A1 (en)*2003-06-262004-12-30Contentguard Holdings, Inc.System and method for controlling rights expressions by stakeholders of an item
US20050021360A1 (en)*2003-06-092005-01-27Miller Charles J.System and method for risk detection reporting and infrastructure
US20050160411A1 (en)*2003-09-192005-07-21Neeraj SangalApparatus and method for managing design of a software system using dependency structure
US6983278B1 (en)*2001-04-102006-01-03Arena Solutions, Inc.System and method for access control and for supply chain management via a shared bill of material
US20060137019A1 (en)*2004-12-152006-06-22International Business Machines CorporationTechniques for managing access to physical data via a data abstraction model
US20060143231A1 (en)*2004-10-082006-06-29Boccasam Prashanth VSystems and methods for monitoring business processes of enterprise applications
US20060143685A1 (en)*2004-12-232006-06-29Microsoft CorporationSystems and processes for managing policy change in a distributed enterprise
US20060190985A1 (en)*2005-02-232006-08-24Microsoft CorporationAutomated policy change alert in a distributed enterprise
US20070233531A1 (en)*2006-04-032007-10-04Mcmahon Piers VIdentity management system and method
US20070233600A1 (en)*2006-04-032007-10-04Computer Associates Think, Inc.Identity management maturity system and method
US20080040810A1 (en)*2006-08-092008-02-14Fuji Xerox Co., Ltd.Binder processing apparatus
US20080060058A1 (en)*2006-08-312008-03-06Accenture Global Services GmbhEnterprise entitlement framework
US20080215509A1 (en)*2005-09-302008-09-04Motorola, Inc.Content Access Rights Management
US20080288330A1 (en)*2007-05-142008-11-20Sailpoint Technologies, Inc.System and method for user access risk scoring
US20090138960A1 (en)*2007-10-262009-05-28University Of OttawaControl access rule conflict detection
US20090320088A1 (en)*2005-05-232009-12-24Jasvir Singh GillAccess enforcer
US7657453B2 (en)*2004-06-302010-02-02Sap AktiengesellschaftSystem, computer-readable medium and method for filtering exceptions generated by forecasting and replenishment engine
US20100077458A1 (en)*2008-09-252010-03-25Card Access, Inc.Apparatus, System, and Method for Responsibility-Based Data Management
US20100161634A1 (en)*2008-12-222010-06-24International Business Machines CorporationBest-value determination rules for an entity resolution system
US20100217639A1 (en)*2009-02-202010-08-26Sunpower CorporationAutomated solar collector installation design including exceptional condition management and display
US20100318446A1 (en)*2009-06-102010-12-16Carter Ronald DFlexible risk management for pre-authorization top-ups in payment devices
US20100333167A1 (en)*2009-06-292010-12-30International Business Machines CorporationAdaptive Rule Loading and Session Control for Securing Network Delivered Services
US20110191213A1 (en)*2010-01-292011-08-04Oracle International CorporationSecuring user access to a parameter value across a software product line differently for different products
US20110265150A1 (en)*2010-04-212011-10-27Fox Entertainment Group, Inc.Media asset/content security control and management system
US20120029969A1 (en)*2010-07-302012-02-02Joern FrankeRisk management of business processes
US20120042354A1 (en)*2010-08-132012-02-16Morgan StanleyEntitlement conflict enforcement
US20120079556A1 (en)*2010-09-272012-03-29Microsoft CorporationSeparation of duties checks from entitlement sets
US20120102543A1 (en)*2010-10-262012-04-26360 GRC, Inc.Audit Management System
US20120166485A1 (en)*2010-12-272012-06-28International Business Machines CorporationInformation Processor, Privilege Management Method, Program, and Recording Medium
US20120233312A1 (en)*2011-03-102012-09-13Ebay Inc.Managing delivery of application server content
US20120278708A1 (en)*2011-05-012012-11-01Thomas JesudasanVerifying configurations
US20130013548A1 (en)*2000-09-282013-01-10Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US20130312084A1 (en)*2006-06-232013-11-21Sanjay TandonMethod and system for assessing cumulative access entitlements of an entity in a system
US20140282825A1 (en)*2013-03-152014-09-18Microsoft CorporationManaging policy and permissions profiles
US20150154418A1 (en)*2013-12-022015-06-04Fortinet, Inc.Secure cloud storage distribution and aggregation
US20150281239A1 (en)*2014-03-262015-10-01Verizon Patent And Licensing Inc.Provision of access privileges to a user
US20150379472A1 (en)*2008-05-302015-12-31Paypal, Inc.Method and system for project management
US20160063780A1 (en)*2014-08-292016-03-03Twin Harbor Labs, LLCMethods, Software, and Systems for Providing Policy-Based Access

Family Cites Families (288)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5649099A (en)1993-06-041997-07-15Xerox CorporationMethod for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
US8639625B1 (en)1995-02-132014-01-28Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US20040010463A1 (en)1996-11-122004-01-15Hahn-Carlson Dean W.Automated transaction processing system and approach
FR2758681A1 (en)1997-01-221998-07-24Canon Kk ALLOCATION TO A PLURALITY OF ELEMENTS OF ACCESS AUTHORIZATIONS TO A SHARED RESOURCE
JPH1174883A (en)1997-08-191999-03-16Internatl Business Mach Corp <Ibm> System management apparatus and method
US6434559B1 (en)1998-10-092002-08-13Xpandable Technology, Inc.Critical resource management
JP2000148276A (en)1998-11-052000-05-26Fujitsu Ltd Security monitoring device, security monitoring method, and security monitoring program recording medium
US7075895B1 (en)1998-12-042006-07-11Sun Microsystems, Inc.System and method for facilitating discovery of network addresses and selected charateristics of computer systems and the like which are connected in digital data networks
JP4232283B2 (en)1999-08-102009-03-04ソニー株式会社 Access history presentation method, access history presentation device, resource provision method and resource provision device, and computer-readable recording medium recording a program
JP3546787B2 (en)1999-12-162004-07-28インターナショナル・ビジネス・マシーンズ・コーポレーション Access control system, access control method, and storage medium
US6748447B1 (en)2000-04-072004-06-08Network Appliance, Inc.Method and apparatus for scalable distribution of information in a distributed network
US7350204B2 (en)*2000-07-242008-03-25Microsoft CorporationPolicies for secure software execution
US6968385B1 (en)2000-12-222005-11-22Bellsouth Intellectual PropertySystems and methods for limiting web site access
US7958237B2 (en)2001-01-232011-06-07Pearl Software, Inc.Method for managing computer network access
US6871232B2 (en)2001-03-062005-03-22International Business Machines CorporationMethod and system for third party resource provisioning management
US6985955B2 (en)2001-01-292006-01-10International Business Machines CorporationSystem and method for provisioning resources to users based on roles, organizational information, attributes and third-party information or authorizations
US6947989B2 (en)2001-01-292005-09-20International Business Machines CorporationSystem and method for provisioning resources to users based on policies, roles, organizational information, and attributes
ATE360854T1 (en)*2001-03-202007-05-15Sap Ag METHOD AND PRODUCT FOR PROVIDING SERVICE-TO-ROLE ASSIGNMENT TO CALL APPLICATION SERVICES IN A ROLE-BASED COMPUTING SYSTEM
US6782350B1 (en)2001-04-272004-08-24Blazent, Inc.Method and apparatus for managing resources
JP4301482B2 (en)2001-06-262009-07-22インターナショナル・ビジネス・マシーンズ・コーポレーション Server, information processing apparatus, access control system and method thereof
CA2404552C (en)2001-09-212008-12-09Corel CorporationSystem and method for secure communication
US6915234B2 (en)2001-09-242005-07-05Electronic Data Systems CorporationMonitoring submission of performance data describing a relationship between a provider and a client
EP1298515A3 (en)2001-09-262004-02-04Siemens AktiengesellschaftMethod for controlling access to resources of a data processing system
US8015204B2 (en)*2001-10-162011-09-06Microsoft CorporationScoped access control metadata element
JP3939977B2 (en)2001-12-202007-07-04富士通株式会社 Access right contradiction detection device and analysis rule creation device
US7730126B2 (en)2002-02-252010-06-01Crawford C S LeeSystems and methods for controlling access within a system of networked and non-networked processor-based systems
FR2837046B1 (en)2002-03-082004-07-16Viaccess Sa PROTOCOL OF REGISTRATION, INVALIDATION AND / OR ERASURE OF RIGHTS OF ACCESS TO ENRICHED INFORMATION AND CORRESPONDING ACCESS CONTROL MODULE
US7061367B2 (en)2002-04-302006-06-13General Electric CompanyManaging access to physical assets
CA2384364A1 (en)2002-05-012003-11-01Accenture Inc.Entitlements administration
US20030221012A1 (en)2002-05-222003-11-27International Business Machines CorporationResource manager system and method for access control to physical resources in an application hosting environment
US7739245B1 (en)2002-09-302010-06-15Symantec Operating CorporationBlock locking in a multi-node environment
US7356601B1 (en)*2002-12-182008-04-08Cisco Technology, Inc.Method and apparatus for authorizing network device operations that are requested by applications
US20040186798A1 (en)2003-02-202004-09-23Blitch Bird D.System and method for managing telecommunications resources
US7577934B2 (en)2003-03-122009-08-18Microsoft CorporationFramework for modeling and providing runtime behavior for business software applications
US7305708B2 (en)*2003-04-142007-12-04Sourcefire, Inc.Methods and systems for intrusion detection
US8347313B2 (en)*2003-05-212013-01-01Resilient Networks, Inc.Method and apparatus for automating organization of processes
US7229392B2 (en)2003-07-112007-06-12Turnbull R GaryExercise system for use within a vehicle
US8185703B2 (en)2003-07-312012-05-22Silicon Graphics International Corp.Detection and control of resource congestion by a number of processors
US8121913B2 (en)2003-08-192012-02-21Swiss Reinsurance Company Ltd.Architecture for account reconciliation
US7814470B2 (en)2003-08-272010-10-12International Business Machines CorporationMultiple service bindings for a real time data integration service
US20050097353A1 (en)2003-10-102005-05-05Bea Systems, Inc.Policy analysis tool
US20050114226A1 (en)2003-11-252005-05-26Tripp Travis S.Automated customer entitlement system for vendor services
US20050138031A1 (en)*2003-12-052005-06-23Wefers Wolfgang M.Systems and methods for assigning task-oriented roles to users
US7284000B2 (en)2003-12-192007-10-16International Business Machines CorporationAutomatic policy generation based on role entitlements and identity attributes
US20050187953A1 (en)2004-02-242005-08-25Finaplex, Inc.Method and system for creating and administering entitlements in a wealth management system
JP2005286909A (en)2004-03-302005-10-13Fujitsu Ltd Handover method and apparatus
US7340469B1 (en)*2004-04-162008-03-04George Mason Intellectual Properties, Inc.Implementing security policies in software development tools
US8024207B2 (en)2004-06-042011-09-20Sap AgAttribute modeler
US7681241B2 (en)2004-06-182010-03-16Red Hat, Inc.Apparatus and method for managing digital rights with arbitration
US20050288978A1 (en)2004-06-292005-12-29International Business Machines CorporationMethod for supply and demand chain integration of test data
US20060015450A1 (en)2004-07-132006-01-19Wells Fargo Bank, N.A.Financial services network and associated processes
US7930539B2 (en)2004-08-032011-04-19Hewlett-Packard Development Company, L.P.Computer system resource access control
US7845001B2 (en)2004-09-152010-11-30Verizon Business Global LlcMethod and system for managing secure platform administration
US7996368B1 (en)2004-09-212011-08-09Cyress Semiconductor CorporationAttribute-based indexers for device object lists
US7630974B2 (en)2004-09-282009-12-08Oracle International CorporationMulti-language support for enterprise identity and access management
US7260689B1 (en)2004-09-302007-08-21Emc CorporationMethods and apparatus for detecting use of common resources
US7831642B1 (en)2004-09-302010-11-09Symantec Operating CorporationPage cache management for a shared file
SG121921A1 (en)2004-11-022006-05-26Soon Seah TohNetwork management appliance
US20060098790A1 (en)2004-11-052006-05-11Mendonca John JAutomatically configuring remote monitoring of a provisionable resource
US7761556B2 (en)2004-11-222010-07-20International Business Machines CorporationPerformance monitoring within an enterprise software system
US20060155738A1 (en)2004-12-162006-07-13Adrian BaldwinMonitoring method and system
US8191115B2 (en)*2005-01-102012-05-29Microsoft CorporationMethod and apparatus for extensible security authorization grouping
US7426453B2 (en)2005-01-142008-09-16Hewlett-Packard Development Company, L.P.Workload placement based upon CRAC unit capacity utilizations
US20060178898A1 (en)2005-02-072006-08-10Babak HabibiUnified event monitoring system
US8874082B2 (en)2005-05-252014-10-28Qualcomm IncorporatedApparatus and methods for protecting data on a wireless device
US9330134B2 (en)2005-05-312016-05-03Fairwarning Ip, LlcUser identity mapping system and method of use
US20120098638A1 (en)2005-06-182012-04-26Crawford C S LeeSystems and methods of operating a secured facility
US7614082B2 (en)2005-06-292009-11-03Research In Motion LimitedSystem and method for privilege management and revocation
US20070022315A1 (en)2005-06-292007-01-25University Of WashingtonDetecting and reporting changes on networked computers
US7603701B2 (en)2005-06-302009-10-13Xerox CorporationTools for access to databases via internet protocol networks
GB0518013D0 (en)2005-09-032005-10-12IbmMethod,apparatus and computer program product for sharing resources
GB0518935D0 (en)*2005-09-162005-10-26Software Global Ltd QA security analysis method
US8166404B2 (en)*2005-10-042012-04-24Disney Enterprises, Inc.System and/or method for authentication and/or authorization
US20070079357A1 (en)*2005-10-042007-04-05Disney Enterprises, Inc.System and/or method for role-based authorization
US8997246B2 (en)*2005-10-042015-03-31Disney Enterprises, Inc.System and/or method for authentication and/or authorization via a network
US9626667B2 (en)2005-10-182017-04-18Intertrust Technologies CorporationDigital rights management engine systems and methods
GB2432992B (en)2005-11-182008-09-10Cramer Systems LtdNetwork planning
US8051298B1 (en)2005-11-292011-11-01Sprint Communications Company L.P.Integrated fingerprinting in configuration audit and management
US8181016B1 (en)2005-12-012012-05-15Jpmorgan Chase Bank, N.A.Applications access re-certification system
US20070129960A1 (en)2005-12-072007-06-07Farrell Brendan P JrCorporate actions monitoring, evaluation and notification system and method
US8150816B2 (en)*2005-12-292012-04-03Nextlabs, Inc.Techniques of optimizing policies in an information management system
US8688813B2 (en)2006-01-112014-04-01Oracle International CorporationUsing identity/resource profile and directory enablers to support identity management
US20070214497A1 (en)2006-03-102007-09-13Axalto Inc.System and method for providing a hierarchical role-based access control
US8555403B1 (en)2006-03-302013-10-08Emc CorporationPrivileged access to managed content
US20070245013A1 (en)2006-04-132007-10-18Fischer International Identity LlcCross domain provisioning methodology and apparatus
US7933925B2 (en)2006-06-012011-04-26International Business Machines CorporationSystem and method for role based analysis and access control
US8135633B1 (en)2006-06-052012-03-13Intuit Inc.System and method for change management and transaction versioning
JP2007328623A (en)*2006-06-082007-12-20Fuji Xerox Co LtdAccess controller
US8086635B1 (en)2006-06-202011-12-27Verizon Business Global LlcCompliance monitoring
CN101098260A (en)2006-06-292008-01-02国际商业机器公司 A distributed device monitoring and management method, device and system
US8359297B2 (en)*2006-06-292013-01-22International Business Machines CorporationMultiple source data management using a conflict rule
US20080005115A1 (en)2006-06-302008-01-03International Business Machines CorporationMethods and apparatus for scoped role-based access control
US9286595B2 (en)2006-08-022016-03-15Emc CorporationSystem and method for collecting and normalizing entitlement data within an enterprise
US8626727B2 (en)2006-08-292014-01-07International Business Machines CorporationSystems and methods for providing a map of an enterprise system
GB0618894D0 (en)2006-09-262006-11-01IbmAn entitlement management system
US8554749B2 (en)2006-10-232013-10-08Adobe Systems IncorporatedData file access control
US8931057B2 (en)2006-10-242015-01-06Avatier CorporationApparatus and method for access validation
US7950049B2 (en)2006-10-242011-05-24Avatier CorporationHybrid meta-directory
US7707623B2 (en)2006-10-242010-04-27Avatier CorporationSelf-service resource provisioning having collaborative compliance enforcement
ATE481802T1 (en)2006-11-152010-10-15Ericsson Telefon Ab L M RESERVATION AND ACCESS AUTHORIZATION FOR RESOURCES FOR ACCESS SELECTION IN MULTIPLE ACCESS NETWORKS
US20080120302A1 (en)2006-11-172008-05-22Thompson Timothy JResource level role based access control for storage management
US7712127B1 (en)*2006-11-172010-05-04Network Appliance, Inc.Method and system of access control based on a constraint controlling role assumption
US7814315B2 (en)2006-11-302010-10-12Red Hat, Inc.Propagation of certificate revocation information
US9124650B2 (en)2006-12-132015-09-01Quickplay Media Inc.Digital rights management in a mobile environment
US20080148253A1 (en)2006-12-152008-06-19Microsoft CorporationAutomatic software license reconciliation
US20080163347A1 (en)2006-12-282008-07-03Peggy Ann RatcliffMethod to maintain or remove access rights
US8196184B2 (en)*2007-02-162012-06-05Microsoft CorporationEfficient data structures for multi-dimensional security
WO2008104821A1 (en)2007-02-272008-09-04Telefonaktiebolaget Lm Ericsson (Publ)Distributed resource management for multi-service, multi-access broadband networks
EP2137680A4 (en)2007-03-152012-01-25Olista LtdSystem and method for providing service or adding benefit to social networks
US20080244605A1 (en)2007-03-302008-10-02Bennington Bud JMethod for task and resource management
US20080244602A1 (en)2007-03-302008-10-02Bennington Bud JMethod for task and resource management
US8160904B1 (en)2007-04-112012-04-17United Services Automobile Association (Usaa)System and method to provide process status update information
US8645987B2 (en)2007-04-132014-02-04Power-Link Software Systems, Inc.Advertisement airing audit system and associated methods
US8230484B1 (en)*2007-05-012012-07-24Emc CorporationControl of resource access privileges via agent authentication
US8176095B2 (en)2007-06-112012-05-08Lucid Design Group, LlcCollecting, sharing, comparing, and displaying resource usage data
US7984512B2 (en)2007-06-142011-07-19Microsoft CorporationIntegrating security by obscurity with access control lists
JP4962162B2 (en)2007-06-212012-06-27富士ゼロックス株式会社 Access right management apparatus and program
US8661534B2 (en)2007-06-262014-02-25Microsoft CorporationSecurity system with compliance checking and remediation
US20100030776A1 (en)2007-07-062010-02-04Rajendra Bhagwatisingh PanwarMethod for taking automated inventory of assets and recognition of the same asset on multiple scans
US8271649B2 (en)2007-08-302012-09-18Nokia CorporationAccess rights used for resource discovery in peer-to-peer networks
US8745087B2 (en)2007-10-012014-06-03Eka Labs, LlcSystem and method for defining and manipulating roles and the relationship of roles to other system entities
US8438611B2 (en)2007-10-112013-05-07Varonis Systems Inc.Visualization of access permission status
WO2009070430A2 (en)2007-11-082009-06-04Suridx, Inc.Apparatus and methods for providing scalable, dynamic, individualized credential services using mobile telephones
US8132231B2 (en)2007-12-062012-03-06International Business Machines CorporationManaging user access entitlements to information technology resources
US20090172674A1 (en)2007-12-282009-07-02International Business Machines CorporationManaging the computer collection of information in an information technology environment
US8254909B1 (en)2008-01-032012-08-28At&T Intellectual Property I, L.P.Computational syndrome detector
US9324168B2 (en)*2008-01-312016-04-26Microsoft Technology Licensing, LlcConstraint-based correction of shape positions in a diagram
US8935701B2 (en)2008-03-072015-01-13Dell Software Inc.Unified management platform in a computer network
US8112301B2 (en)2008-04-142012-02-07Tra, Inc.Using consumer purchase behavior for television targeting
US8250637B2 (en)*2008-04-292012-08-21International Business Machines CorporationDetermining the degree of relevance of duplicate alerts in an entity resolution system
US8015137B2 (en)*2008-04-292011-09-06International Business Machines CorporationDetermining the degree of relevance of alerts in an entity resolution system over alert disposition lifecycle
US8326788B2 (en)*2008-04-292012-12-04International Business Machines CorporationDetermining the degree of relevance of alerts in an entity resolution system
US20090271394A1 (en)*2008-04-292009-10-29Allen Thomas BDetermining the degree of relevance of entities and identities in an entity resolution system that maintains alert relevance
US10586277B2 (en)2008-05-152020-03-10Wells Fargo Bank, N.A.Graphical user interface system and method
EP2840753B1 (en)2008-05-212019-05-15McAfee, LLCSystem and method for discovery of network entities
WO2009145760A1 (en)2008-05-272009-12-03Hewlett-Packard Development Company, L.P.Hierarchical administration of resources
JP5083042B2 (en)*2008-05-302012-11-28富士通株式会社 Access control policy compliance check program
US20090313079A1 (en)2008-06-122009-12-17Microsoft CorporationManaging access rights using projects
US20100004948A1 (en)*2008-07-012010-01-07Mckesson Financial Holdings LimitedApparatus, method, system and computer program product for creating, individualizing and integrating care plans
US8196195B2 (en)2008-07-112012-06-05International Business Machines CorporationRole-based privilege management
US8555333B2 (en)*2008-08-182013-10-08International Business Machines CorporationIdentifying and resolving separation of duties conflicts in a multi-application environment
US8645843B2 (en)2008-08-292014-02-04International Business Machines CorporationSupporting role-based access control in component-based software systems
WO2010035236A1 (en)*2008-09-252010-04-01Nxp B.V.System for managing access rights to an object of an object oriented programming language
US8327457B1 (en)*2008-10-312012-12-04Sprint Communications Company L.P.Managing asset access
US8204907B1 (en)2008-11-102012-06-19Symantec CorporationSystems and methods for collecting file access history information
US9535959B2 (en)2008-11-212017-01-03Li SunMethod and apparatus for reconciliation of multiple sets of data
US20120005724A1 (en)2009-02-092012-01-05Imera Systems, Inc.Method and system for protecting private enterprise resources in a cloud computing environment
US8855601B2 (en)*2009-02-172014-10-07Lookout, Inc.System and method for remotely-initiated audio communication
US8719582B2 (en)2009-03-032014-05-06Microsoft CorporationAccess control using identifiers in links
US20100250730A1 (en)2009-03-312010-09-30Microsoft CorporationAutomated license reconciliation for deployed applications
EP2424435B1 (en)2009-04-302021-06-02Dexcom, Inc.Performance reports associated with continuous sensor data from multiple analysis time periods
US8364770B2 (en)*2009-06-082013-01-29Greenfly America, Inc.Heterogeneous network delivery of electronic messages in accordance with privacy and personalization criteria
US8590003B2 (en)2009-06-152013-11-19Microsoft CorporationControlling access to resources by hosted entities
US8639622B1 (en)2009-08-312014-01-28Wells Fargo Bank, N.A.Budget management system and method
US8578507B2 (en)2009-09-092013-11-05Varonis Systems, Inc.Access permissions entitlement review
US8775605B2 (en)2009-09-292014-07-08At&T Intellectual Property I, L.P.Method and apparatus to identify outliers in social networks
US8306854B1 (en)2009-10-162012-11-06Sprint Communications Company L.P.Payroll time measurement and reporting
US20110264278A1 (en)2009-10-302011-10-27Rudin Management Co. Inc.Property management system and method of operation
US8745758B2 (en)2009-11-022014-06-03Time Warner Cable Enterprises LlcApparatus and methods for device authorization in a premises network
US10325078B2 (en)2009-11-112019-06-18International Business Machines CorporationSoftware license management impact analysis
US10019677B2 (en)2009-11-202018-07-10Alert Enterprise, Inc.Active policy enforcement
WO2011063269A1 (en)*2009-11-202011-05-26Alert Enterprise, Inc.Method and apparatus for risk visualization and remediation
US8875128B2 (en)*2009-11-302014-10-28Red Hat Israel, Ltd.Controlling permissions in virtualization environment using hierarchical labeling
US8036138B2 (en)2009-12-022011-10-11Digi International Inc.System and method for optimized initial configuration distribution for cyclic sleeping devices
CN101763418A (en)2009-12-162010-06-30中兴通讯股份有限公司File resource access method and device
US8943415B2 (en)2010-01-082015-01-27Microsoft CorporationThird party control of location information access
US8706692B1 (en)2010-02-122014-04-22Citibank, N.A.Corporate infrastructure management system
US20110239044A1 (en)2010-02-262011-09-29Ebay Inc.Management and tracking of complex entitlement benefits
WO2011116083A1 (en)2010-03-162011-09-22Optimi CorporationDetermining essential resources in a wireless network
WO2011122366A1 (en)*2010-03-312011-10-06日本電気株式会社Access control program, system and method
US20110246527A1 (en)*2010-03-312011-10-06Salesforce.Com, Inc.System, method and computer program product for associating a permission set with one or more users
US8789132B2 (en)2010-06-072014-07-22Oracle International CorporationEnterprise model for provisioning fine-grained access control
US20110307788A1 (en)*2010-06-152011-12-15Microsoft CorporationRole-based presentation views
US9202049B1 (en)*2010-06-212015-12-01Pulse Secure, LlcDetecting malware on mobile devices
US8613051B2 (en)2010-07-122013-12-17Bruce NguyenSystem and method for COPPA compliance for online education
US9122998B2 (en)2010-07-282015-09-01International Business Machines CorporationCatalog-based software license reconciliation
US9230273B2 (en)2010-07-282016-01-05International Business Machines CorporationCreation and use of constraint templates
US8386711B2 (en)2010-08-102013-02-26Hitachi, Ltd.Management method and management system for computer system
US8418229B2 (en)2010-08-172013-04-09Bank Of America CorporationSystems and methods for performing access entitlement reviews
US20120046989A1 (en)2010-08-172012-02-23Bank Of America CorporationSystems and methods for determining risk outliers and performing associated risk reviews
US8474018B2 (en)2010-09-032013-06-25Ebay Inc.Role-based attribute based access control (RABAC)
JP5763903B2 (en)2010-09-302015-08-12インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method for managing access right, system and computer program
US8958780B2 (en)2010-10-072015-02-17Blackberry LimitedProvisioning based on application and device capability
US8490152B2 (en)2010-10-262013-07-16Microsoft CorporationEntitlement lifecycle management in a resource management system
US8397302B2 (en)2010-10-292013-03-12Hewlett-Packard Development Company, L.P.System and method for analyzing a process
US8929624B2 (en)2010-11-262015-01-06General Electric CompanySystems and methods for comparing different medical images to analyze a structure-of-interest
US8925028B2 (en)2010-12-102014-12-30Verizon Patent And Licensing Inc.Auto reconciliation
US8832410B2 (en)2010-12-142014-09-09Lsi CorporationDisk-based storage device with frequently accessed partition
US8539556B1 (en)2010-12-202013-09-17Amazon Technologies, Inc.Disabling administrative access to computing resources
US8788669B2 (en)2011-01-032014-07-22Novell, Inc.Policy and identity based workload provisioning
US20120221347A1 (en)2011-02-232012-08-30Bruce ReinerMedical reconciliation, communication, and educational reporting tools
US8904553B2 (en)2011-03-152014-12-02Business Objects Software LimitedResource expression for access control
US9239930B2 (en)*2011-03-162016-01-19Successfactors, Inc.System and method for assigning permissions to access data and perform actions in a computer system
US9244818B1 (en)2011-03-292016-01-26Amazon Technologies, Inc.Automated selection of quality control tests to run on a software application
US8656455B1 (en)*2011-03-312014-02-18Emc CorporationManaging data loss prevention policies
US9298574B2 (en)2011-04-142016-03-29Ricoh Company, Ltd.Device management system including reporter server
US9111086B2 (en)2011-04-182015-08-18Sap SeSecure management of user rights during accessing of external systems
AU2012250953B2 (en)2011-04-302015-04-09Omnissa LlcDynamic management of groups for entitlement and provisioning of computer resources
US9143509B2 (en)2011-05-202015-09-22Microsoft Technology Licensing, LlcGranular assessment of device state
US8689298B2 (en)2011-05-312014-04-01Red Hat, Inc.Resource-centric authorization schemes
WO2012166944A2 (en)2011-06-032012-12-06Uc Group LimitedSystems and methods for registration, validation, and monitoring of users over multiple websites
US8650550B2 (en)2011-06-072014-02-11Blackberry LimitedMethods and devices for controlling access to computing resources
JP5990264B2 (en)*2011-06-162016-09-07ヒューレット−パッカード デベロップメント カンパニー エル.ピー.Hewlett‐Packard Development Company, L.P. Policy generation system and method
US8775593B2 (en)2011-06-292014-07-08International Business Machines CorporationManaging organizational computing resources in accordance with computing environment entitlement contracts
WO2013009481A2 (en)2011-07-082013-01-17Ventumar S.A.Systems and methods for network commerce
US8813085B2 (en)2011-07-192014-08-19Elwha LlcScheduling threads based on priority utilizing entitlement vectors, weight and usage level
US9495393B2 (en)2011-07-272016-11-15EMC IP Holding Company, LLCSystem and method for reviewing role definitions
US20140164544A1 (en)2011-07-292014-06-12Eric GagneraudEnabling a computing device to utilize another computing device
WO2013018808A1 (en)2011-08-022013-02-07日本電気株式会社Distributed storage system and method
US9065826B2 (en)2011-08-082015-06-23Microsoft Technology Licensing, LlcIdentifying application reputation based on resource accesses
US8924548B2 (en)2011-08-162014-12-30Panduit Corp.Integrated asset tracking, task manager, and virtual container for data center management
JP5759305B2 (en)2011-08-192015-08-05キヤノン株式会社 Access management system, access management method, access management server, linkage server, and program
US9607142B2 (en)2011-09-092017-03-28International Business Machines CorporationContext aware recertification
US20130080520A1 (en)2011-09-222013-03-28Nokia CorporationMethod and apparatus for provisioning resource credentials based on social networking data
US20130097223A1 (en)2011-10-172013-04-18Morgan StanleyComputer network asset management
US8918425B2 (en)2011-10-212014-12-23International Business Machines CorporationRole engineering scoping and management
US8635689B2 (en)2011-10-272014-01-21International Business Machines CorporationHybrid role mining
US8819492B2 (en)2011-11-032014-08-26Tata Consultancy Services LimitedSystem and method for testing and analyses of the computer applications
US20130159049A1 (en)*2011-12-152013-06-20Sayekumar ArumugamAutomatic risk calibration of roles in computer systems
US9069984B2 (en)*2011-12-212015-06-30Sap SeOn-demand authorization management
US20130246336A1 (en)2011-12-272013-09-19Mcafee, Inc.System and method for providing data protection workflows in a network environment
US20140337971A1 (en)2012-02-222014-11-13Marco Casassa MontComputer infrastructure security management
EP2631841B1 (en)2012-02-272015-11-25Axiomatics ABProvisioning authorization claims using attribute-based access-control policies
US9460303B2 (en)*2012-03-062016-10-04Microsoft Technology Licensing, LlcOperating large scale systems and cloud services with zero-standing elevated permissions
US9348802B2 (en)2012-03-192016-05-24Litéra CorporationSystem and method for synchronizing bi-directional document management
US9003507B2 (en)2012-03-232015-04-07Cloudpath Networks, Inc.System and method for providing a certificate to a third party request
JP5853818B2 (en)*2012-03-282016-02-09富士通株式会社 Server device, privilege enjoyment opportunity notification program and privilege enjoyment opportunity notification method
US9148429B2 (en)2012-04-232015-09-29Google Inc.Controlling access by web applications to resources on servers
CA2871600A1 (en)2012-04-272013-10-31Intralinks, Inc.Computerized method and system for managing networked secure collaborative exchange
US8973106B2 (en)2012-05-032015-03-03Salesforce.Com, Inc.Computer implemented methods and apparatus for providing permissions to users in an on-demand service environment
EP2663053A3 (en)2012-05-092014-01-01Computer Security Products, Inc.Methods and apparatus for creating and implementing security policies for resources on a network
US8964990B1 (en)2012-05-172015-02-24Amazon Technologies, Inc.Automating key rotation in a distributed system
US9173074B2 (en)2012-05-272015-10-27Qualcomm IncorporatedPersonal hub presence and response
US9058471B2 (en)2012-06-082015-06-16Oracle International CorporationAuthorization system for heterogeneous enterprise environments
US20130333021A1 (en)2012-06-082013-12-12Forty1 Technologies Inc.Preventing malicious software from utilizing access rights
US20140208399A1 (en)2012-06-222014-07-24Frank J. Ponzio, Jr.Method and system for accessing a computing resource
US20140040314A1 (en)2012-07-312014-02-06Verizon Patent And Licensing Inc.Method and system for providing data access via a common access manager configured to support security for multiple database management system types
US9178886B2 (en)*2012-08-292015-11-03Red Hat Israel, Ltd.Flattening permission trees in a virtualization environment
US20140067538A1 (en)*2012-09-062014-03-06Meda6Degrees, Inc.Methods, systems, and media for inhibiting advertisement collisions
US9916461B2 (en)2012-09-102018-03-13International Business Machines CorporationIdentity context-based access control
US9613330B2 (en)2012-09-262017-04-04EMC IP Holding Company LLCIdentity and access management
US9501801B2 (en)*2012-09-272016-11-22Oracle International CorporationOne click to update buyer in mass on purchaser orders and prepare changes to communicate to supplier
US9552231B2 (en)2012-09-272017-01-24Adobe Systems IncorporatedClient classification-based dynamic allocation of computing infrastructure resources
US9741000B2 (en)*2012-09-282017-08-22Oracle International CorporationRole-based framework and mechanisms for configuration of collaborative applications
US20140108251A1 (en)2012-10-012014-04-17Robert Whitney AndersonCollaborative Fraud Determination And Prevention
US20140101061A1 (en)2012-10-092014-04-10International Business Machines CorporationCorrelating software licenses to software installations
US20140108403A1 (en)2012-10-122014-04-17International Business Machines CorporationLicense Reconciliation with Multiple License Types and Restrictions
US9154507B2 (en)2012-10-152015-10-06International Business Machines CorporationAutomated role and entitlements mining using network observations
US20140129511A1 (en)2012-11-062014-05-08Microsoft CorporationOn-demand viewing of a report with security permissions
US9189644B2 (en)2012-12-202015-11-17Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9489390B2 (en)2012-12-202016-11-08Bank Of America CorporationReconciling access rights at IAM system implementing IAM data model
US9483488B2 (en)2012-12-202016-11-01Bank Of America CorporationVerifying separation-of-duties at IAM system implementing IAM data model
US9529629B2 (en)2012-12-202016-12-27Bank Of America CorporationComputing resource inventory system
US9537892B2 (en)*2012-12-202017-01-03Bank Of America CorporationFacilitating separation-of-duties when provisioning access rights in a computing system
US9477838B2 (en)2012-12-202016-10-25Bank Of America CorporationReconciliation of access rights in a computing system
US9250955B1 (en)2012-12-312016-02-02Emc CorporationManaging task approval
US9130920B2 (en)2013-01-072015-09-08Zettaset, Inc.Monitoring of authorization-exceeding activity in distributed networks
US20140237498A1 (en)2013-02-202014-08-21Comcast Cable Communications, LlcCross platform content exposure tracking
US9092493B2 (en)2013-02-252015-07-28International Business Machines CorporationAdaptive warehouse data validation tool
US9306922B2 (en)2013-03-122016-04-05Sap SeSystem and method for common on-behalf authorization protocol infrastructure
US9600849B2 (en)*2013-03-122017-03-21Sap Portals Israel Ltd.Providing multiple roles in computer-implemented workspaces
US9059977B2 (en)2013-03-132015-06-16Route1 Inc.Distribution of secure or cryptographic material
US20140280977A1 (en)2013-03-152014-09-18Servicemesh, Inc.Systems and methods for evaluating computing resources
US20150026823A1 (en)2013-03-152015-01-22Dataguise, Inc.Method and system for entitlement setting, mapping, and monitoring in big data stores
WO2014184671A2 (en)*2013-04-152014-11-20Tactegic Holdings Pty LimitedSystems and methods for efficient network security adjustment
US9392022B2 (en)2013-05-032016-07-12Vmware, Inc.Methods and apparatus to measure compliance of a virtual computing environment
US9392309B2 (en)2013-05-062016-07-12Verizon Patent And Licensing Inc.Entitlement management for video customers
US20140344129A1 (en)2013-05-172014-11-20Bottomline Technologies (De) Inc.Centralized entitlements
US9619646B2 (en)2013-05-242017-04-11Qualcomm IncorporatedAccess control for wireless docking
US9325571B2 (en)2013-05-282016-04-26Dropbox, Inc.Access permissions for shared content
US9246945B2 (en)2013-05-292016-01-26International Business Machines CorporationTechniques for reconciling permission usage with security policy for policy optimization and monitoring continuous compliance
US20140365353A1 (en)2013-06-102014-12-11Rawllin International Inc.Management of participation of market participants in a financial exchange
US20140379593A1 (en)2013-06-232014-12-25Cisco Technology, Inc.Managing trusted relationships among parties associated with a license for using a computer product
US9515832B2 (en)2013-06-242016-12-06Microsoft Technology Licensing, LlcProcess authentication and resource permissions
US20150081880A1 (en)2013-09-172015-03-19Stackdriver, Inc.System and method of monitoring and measuring performance relative to expected performance characteristics for applications and software architecture hosted by an iaas provider
CN104516704B (en)*2013-10-082019-12-13中兴通讯股份有限公司Application activation control method and device in multi-screen system and mobile terminal
CN105723402A (en)2013-10-252016-06-29西斯摩斯公司 Systems and methods for determining influencers in a social data network
US10037554B2 (en)2013-10-302018-07-31Vigo Software LtdAggregated billing for application-based network access and content consumption
US20150163067A1 (en)2013-12-092015-06-11Lenovo Enterprise Solutions (Singapore) Pte. LtdControl of computing device use during conferences
US9280646B1 (en)*2013-12-172016-03-08Vce Company, LlcMethods, systems, and computer readable mediums for role-based access control involving one or more converged infrastructure systems
US9602545B2 (en)2014-01-132017-03-21Oracle International CorporationAccess policy management using identified roles
US9380342B2 (en)2014-02-282016-06-28Rovi Guides, Inc.Systems and methods for control of media access based on crowd-sourced access control data and user-attributes
US20150249852A1 (en)2014-02-282015-09-03United Video Properties, Inc.Systems and methods for crowd-sourced media access control
US9691074B2 (en)2014-03-312017-06-27Google Inc.Performance evaluation of an information resource in a computer network environment
RU2017118321A (en)*2014-10-272018-11-30Онапсис, Инк. SYSTEM AND METHOD FOR DETECTION AND PREVENTION IN REAL TIME OF DISTURBANCES OF DIFFERENCE OF PERFORMED TASKS IN CRITICALLY IMPORTANT BUSINESS APPLICATIONS
US9767548B2 (en)2015-04-242017-09-19Kla-Tencor Corp.Outlier detection on pattern of interest image populations
US10140327B2 (en)2015-08-242018-11-27Palantir Technologies Inc.Feature clustering of users, user correlation database access, and user interface generation system
US10503483B2 (en)*2016-02-122019-12-10Fisher-Rosemount Systems, Inc.Rule builder in a process control network

Patent Citations (49)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5574927A (en)*1994-03-251996-11-12International Meta Systems, Inc.RISC architecture computer configured for emulation of the instruction set of a target computer
EP0707264A2 (en)*1994-10-131996-04-17Sun Microsystems, Inc.System and method for determining whether a software package conforms to packaging rules and requirements
US5889953A (en)*1995-05-251999-03-30Cabletron Systems, Inc.Policy management and conflict resolution in computer networks
US5987611A (en)*1996-12-311999-11-16Zone Labs, Inc.System and methodology for managing internet access on a per application basis for client computers connected to the internet
US6321334B1 (en)*1998-07-152001-11-20Microsoft CorporationAdministering permissions associated with a security zone in a computer system security model
US6460141B1 (en)*1998-10-282002-10-01Rsa Security Inc.Security and access management system for web-enabled and non-web-enabled applications and content on a computer network
US20130013548A1 (en)*2000-09-282013-01-10Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US20020095322A1 (en)*2000-10-272002-07-18Manugistics, Inc.System and method of monitoring supply chain parameters
US20040034582A1 (en)*2001-01-172004-02-19Contentguard Holding, Inc.System and method for supplying and managing usage rights based on rules
US20020156816A1 (en)*2001-02-132002-10-24Mark KantrowitzMethod and apparatus for learning from user self-corrections, revisions and modifications
US6983278B1 (en)*2001-04-102006-01-03Arena Solutions, Inc.System and method for access control and for supply chain management via a shared bill of material
US20040158455A1 (en)*2002-11-202004-08-12Radar Networks, Inc.Methods and systems for managing entities in a computing device using semantic objects
US20050021360A1 (en)*2003-06-092005-01-27Miller Charles J.System and method for risk detection reporting and infrastructure
US20040267552A1 (en)*2003-06-262004-12-30Contentguard Holdings, Inc.System and method for controlling rights expressions by stakeholders of an item
US20050160411A1 (en)*2003-09-192005-07-21Neeraj SangalApparatus and method for managing design of a software system using dependency structure
US7657453B2 (en)*2004-06-302010-02-02Sap AktiengesellschaftSystem, computer-readable medium and method for filtering exceptions generated by forecasting and replenishment engine
US20060143231A1 (en)*2004-10-082006-06-29Boccasam Prashanth VSystems and methods for monitoring business processes of enterprise applications
US20060137019A1 (en)*2004-12-152006-06-22International Business Machines CorporationTechniques for managing access to physical data via a data abstraction model
US20060143685A1 (en)*2004-12-232006-06-29Microsoft CorporationSystems and processes for managing policy change in a distributed enterprise
US20060190985A1 (en)*2005-02-232006-08-24Microsoft CorporationAutomated policy change alert in a distributed enterprise
US20090320088A1 (en)*2005-05-232009-12-24Jasvir Singh GillAccess enforcer
US20080215509A1 (en)*2005-09-302008-09-04Motorola, Inc.Content Access Rights Management
US20070233531A1 (en)*2006-04-032007-10-04Mcmahon Piers VIdentity management system and method
US20070233600A1 (en)*2006-04-032007-10-04Computer Associates Think, Inc.Identity management maturity system and method
US20130312084A1 (en)*2006-06-232013-11-21Sanjay TandonMethod and system for assessing cumulative access entitlements of an entity in a system
US20080040810A1 (en)*2006-08-092008-02-14Fuji Xerox Co., Ltd.Binder processing apparatus
US20080060058A1 (en)*2006-08-312008-03-06Accenture Global Services GmbhEnterprise entitlement framework
US8931055B2 (en)*2006-08-312015-01-06Accenture Global Services GmbhEnterprise entitlement framework
US20080288330A1 (en)*2007-05-142008-11-20Sailpoint Technologies, Inc.System and method for user access risk scoring
US20090138960A1 (en)*2007-10-262009-05-28University Of OttawaControl access rule conflict detection
US20150379472A1 (en)*2008-05-302015-12-31Paypal, Inc.Method and system for project management
US20100077458A1 (en)*2008-09-252010-03-25Card Access, Inc.Apparatus, System, and Method for Responsibility-Based Data Management
US20100161634A1 (en)*2008-12-222010-06-24International Business Machines CorporationBest-value determination rules for an entity resolution system
US20100217639A1 (en)*2009-02-202010-08-26Sunpower CorporationAutomated solar collector installation design including exceptional condition management and display
US20100318446A1 (en)*2009-06-102010-12-16Carter Ronald DFlexible risk management for pre-authorization top-ups in payment devices
US20100333167A1 (en)*2009-06-292010-12-30International Business Machines CorporationAdaptive Rule Loading and Session Control for Securing Network Delivered Services
US20110191213A1 (en)*2010-01-292011-08-04Oracle International CorporationSecuring user access to a parameter value across a software product line differently for different products
US20110265150A1 (en)*2010-04-212011-10-27Fox Entertainment Group, Inc.Media asset/content security control and management system
US20120029969A1 (en)*2010-07-302012-02-02Joern FrankeRisk management of business processes
US20120042354A1 (en)*2010-08-132012-02-16Morgan StanleyEntitlement conflict enforcement
US20120079556A1 (en)*2010-09-272012-03-29Microsoft CorporationSeparation of duties checks from entitlement sets
US20120102543A1 (en)*2010-10-262012-04-26360 GRC, Inc.Audit Management System
US20120166485A1 (en)*2010-12-272012-06-28International Business Machines CorporationInformation Processor, Privilege Management Method, Program, and Recording Medium
US20120233312A1 (en)*2011-03-102012-09-13Ebay Inc.Managing delivery of application server content
US20120278708A1 (en)*2011-05-012012-11-01Thomas JesudasanVerifying configurations
US20140282825A1 (en)*2013-03-152014-09-18Microsoft CorporationManaging policy and permissions profiles
US20150154418A1 (en)*2013-12-022015-06-04Fortinet, Inc.Secure cloud storage distribution and aggregation
US20150281239A1 (en)*2014-03-262015-10-01Verizon Patent And Licensing Inc.Provision of access privileges to a user
US20160063780A1 (en)*2014-08-292016-03-03Twin Harbor Labs, LLCMethods, Software, and Systems for Providing Policy-Based Access

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
An Oracle White Paper, "Integrated Identity Governance", A Business Overview, 17 pages, July 2012.*

Cited By (38)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10083312B2 (en)2012-12-202018-09-25Bank Of America CorporationQuality assurance checks of access rights in a computing system
US10341385B2 (en)2012-12-202019-07-02Bank Of America CorporationFacilitating separation-of-duties when provisioning access rights in a computing system
US11283838B2 (en)2012-12-202022-03-22Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9477838B2 (en)*2012-12-202016-10-25Bank Of America CorporationReconciliation of access rights in a computing system
US9483488B2 (en)2012-12-202016-11-01Bank Of America CorporationVerifying separation-of-duties at IAM system implementing IAM data model
US9489390B2 (en)2012-12-202016-11-08Bank Of America CorporationReconciling access rights at IAM system implementing IAM data model
US9495380B2 (en)2012-12-202016-11-15Bank Of America CorporationAccess reviews at IAM system implementing IAM data model
US10664312B2 (en)2012-12-202020-05-26Bank Of America CorporationComputing resource inventory system
US9529989B2 (en)2012-12-202016-12-27Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US10491633B2 (en)2012-12-202019-11-26Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9536070B2 (en)2012-12-202017-01-03Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9537892B2 (en)*2012-12-202017-01-03Bank Of America CorporationFacilitating separation-of-duties when provisioning access rights in a computing system
US9542433B2 (en)2012-12-202017-01-10Bank Of America CorporationQuality assurance checks of access rights in a computing system
US9558334B2 (en)2012-12-202017-01-31Bank Of America CorporationAccess requests at IAM system implementing IAM data model
US9639594B2 (en)2012-12-202017-05-02Bank Of America CorporationCommon data model for identity access management data
US9792153B2 (en)2012-12-202017-10-17Bank Of America CorporationComputing resource inventory system
US9529629B2 (en)2012-12-202016-12-27Bank Of America CorporationComputing resource inventory system
US20140289796A1 (en)*2012-12-202014-09-25Bank Of America CorporationReconciliation of access rights in a computing system
US20160147886A1 (en)*2014-11-202016-05-26Facebook, Inc.Querying Groups of Users Based on User Attributes for Social Analytics
US9846746B2 (en)*2014-11-202017-12-19Facebook, Inc.Querying groups of users based on user attributes for social analytics
US10075475B2 (en)*2015-02-062018-09-11Honeywell International Inc.Apparatus and method for dynamic customization of cyber-security risk item rules
US10686841B2 (en)2015-02-062020-06-16Honeywell International Inc.Apparatus and method for dynamic customization of cyber-security risk item rules
US20160234252A1 (en)*2015-02-062016-08-11Honeywell International Inc.Apparatus and method for dynamic customization of cyber-security risk item rules
US20160373402A1 (en)*2015-06-222016-12-22Bank Of America CorporationInformation Management and Notification System
US11847241B1 (en)*2018-04-202023-12-19Amazon Technologies, Inc.Management of service permissions
WO2020131927A1 (en)*2018-12-182020-06-25Jpmorgan Chase Bank, N.A.Account lifecycle management
US11206268B2 (en)2018-12-182021-12-21Jpmorgan Chase Bank, N.A.Account lifecycle management
US11416771B2 (en)2019-11-112022-08-16International Business Machines CorporationSelf-learning peer group analysis for optimizing identity and access management environments
US11818174B1 (en)2020-11-252023-11-14Amazon Technologies, Inc.Contextual policy weighting for permissions searching
US11777991B2 (en)2020-11-302023-10-03Amazon Technologies, Inc.Forecast-based permissions recommendations
US12335318B1 (en)*2020-12-042025-06-17Amazon Technologies, Inc.Detecting conflicts between a generated access management policy and invoked access management policies
US11632376B2 (en)*2020-12-072023-04-18Hangzhou Jindoutengyun Technologies Co., Ltd.Network resource access system and method, user portal and resource portal
US20220182389A1 (en)*2020-12-072022-06-09Hangzhou Jindoutengyun Technologies Co., Ltd.Network resource access system and method, user portal and resource portal
US11783325B1 (en)2021-03-262023-10-10Amazon Technologies, Inc.Removal probability-based weighting for resource access
US11803621B1 (en)*2021-03-312023-10-31Amazon Technologies, Inc.Permissions searching by scenario
US20240419818A1 (en)*2021-11-022024-12-19Nagravision SàrlAccess management system for managing access to resources
CN114143106A (en)*2021-12-072022-03-04北京天融信网络安全技术有限公司Approval method and device, electronic equipment and storage medium
US12177263B1 (en)*2022-03-232024-12-24Amazon Technologies, Inc.Semi-automated role creation for governance of machine-learning systems

Also Published As

Publication numberPublication date
US9537892B2 (en)2017-01-03
US10341385B2 (en)2019-07-02
US20160226919A1 (en)2016-08-04

Similar Documents

PublicationPublication DateTitle
US10664312B2 (en)Computing resource inventory system
US10341385B2 (en)Facilitating separation-of-duties when provisioning access rights in a computing system
US9916450B2 (en)Reconciliation of access rights in a computing system
US10083312B2 (en)Quality assurance checks of access rights in a computing system
US20140289793A1 (en)Granular risk expression
US20140289846A1 (en)Facilitating review of access rights in a computing system
US12437101B2 (en)Privilege graph-based representation of data access authorizations
US9213540B1 (en)Automated workflow management system for application and data retirement
US10242122B2 (en)Automated workflow management system for application and data retirement
US6876993B2 (en)Method and system for generating management solutions
US20070299953A1 (en)Centralized work distribution management
US20050144062A1 (en)Business continuity information management system
US8555333B2 (en)Identifying and resolving separation of duties conflicts in a multi-application environment
US11477244B2 (en)Method and system for data loss prevention management
US20150373028A1 (en)Entitlement Predictions
US9798576B2 (en)Updating and redistributing process templates with configurable activity parameters
EP3709237A1 (en)Method and system for privacy enabled task allocation
US9772873B2 (en)Generating process templates with configurable activity parameters by merging existing templates
US20090222361A1 (en)Data management system
US12216784B1 (en)Systems and processes for synchronizing disparate applications
US11120155B2 (en)Extensibility tools for defining custom restriction rules in access control
US20130041712A1 (en)Emerging risk identification process and tool
US20130166342A1 (en)Method and Apparatus for Computer Based Process Monitoring and Control
US20240154994A1 (en)Automated system access review using inter-system mappings
US20200349483A1 (en)Risk hierarchy and roll-up scoring

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:BANK OF AMERICA CORPORATION, NORTH CAROLINA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MOLOIAN, ARMEN;RITCHEY, RONALD W.;SIGNING DATES FROM 20140410 TO 20140430;REEL/FRAME:032804/0137

STCFInformation on status: patent grant

Free format text:PATENTED CASE

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8


[8]ページ先頭

©2009-2025 Movatter.jp